[1] |
GOLDREICH O , GOLDWASSER S , MICALI S . How to construct random functions[J]. J ACM, 1986,33(4): 792-807.
|
[2] |
NAOR M , REINGOLD O . Synthesizers and their application to the parallel construction of pseudorandom functions[J]. Journal of Computer and System Sciences, 1999,58: 336-375.
|
[3] |
AJTAI M . Generating hard instances of lattice problems[A]. STOC 1996[C]. Philadelphia,Pennsylvania, 1996. 99-108.
|
[4] |
REGEV O . On lattices,learning with errors,random linear codes,and cryptography[J]. Journal of the ACM, 2009,56(6): 1-40.
|
[5] |
PEIKERT C , WATERS B . Lossy trapdoor functions and their applications[A]. STOC 2008[C]. Victoria,British Columbia, 2008. 187-196.
|
[6] |
GENTRY C , PEIKERT C , VAIKUNTANATHAN V . Trapdoors for hard lattices and new cryptographic constructions[A]. STOC 2008[C]. Victoria,British Columbia, 2008. 197-206.
|
[7] |
GENTRY C . Fully homomorphic encryption using ideal lattices[A]. STOC 2009[C]. Bethesda,Maryland,USA, 2009. 169-178.
|
[8] |
CASH D , HOFHEINZ D , KILTZ E ,et al. Bonsai trees,or how to delegate a lattice basis[A]. Cryptology-EUROCRYPT 2010[C]. French Riviera, 2010. 523-552.
|
[9] |
AGRAWAL S , BONEH D , BOYEN X . Efficient lattice (H)IBE in the standard model[A]. Cryptology–EUROCRYPT 2010[C]. French Riviera, 2010. 553-572.
|
[10] |
BANERJER A , PEIKERT C , ROSEN A . Pseudorandom functions and lattices[A]. Cryptology – EUROCRYPT 2012[C]. Cambridge,UK, 2012. 719-737.
|
[11] |
GORDON S D , KATZ J , VAIKUNTANATHAN V . A group signature scheme from lattice assumptions[A]. Cryptology-ASIACRYPT 2010[C]. Singapore, 2010. 395-412.
|
[12] |
LYUBASHEVSKY V . Lattice signatures without trapdoors[A]. Cryptology-EUROCRYPT 2012[C]. Cambridge,UK, 2012. 738-755.
|
[13] |
MICCIANCIO D , MOL P . Pseudorandom knapsacks and the sample complicity of LWE search-to-decision reductions[A]. CryptologyCRYPTO 2011[C]. Santa Barbara,CA,USA, 2011. 465-484.
|